OSC&R, OpenVEX, C-SCRM set to tackle supply chain attacks

Share post:

The OSC&R (Open Software Supply Chain Attack Reference), Open Visibility Exploitability eXchange (OpenVEX), a tool for addressing vulnerabilities in enterprise software, and cyber supply chain risk management (C-SCRM), are set to help enterprises combat supply chain attacks. The tools will provide a common framework for evaluating and measuring the risk to their supply chains.

OSC&R is a framework that enables a thorough, systematic, and actionable understanding of attacker behaviors and techniques used to compromise the software supply chain. OSC&R provides valuable and objective insights into an attack’s target and current phase.

The OSC&R is designed to provide organizations with a common language and tools for understanding attack tactics and defenses, prioritizing threats, and tracking the behavior of threat groups. It will also be updated as new tactics emerge, and it will aid in red-team penetration exercises, with input from other vendors.

While OpenVEX is designed to meet the minimum requirements defined by the United States government’s CISA cybersecurity agency and will help reduce false-positives and improve the quality of SBOMs, it is not without limitations (software bill of material). It will enable software vendors to communicate precise, actionable metadata, improving the signal-to-noise ratio and providing critical context to vulnerability warnings.

It will also make it easier for software developers to accurately describe the exploitability of their artifacts, as well as for software consumers to filter out false positives from vulnerability scanners.

While the Cybersecurity and Infrastructure Security Agency has established a new office to assist government and industry partners in implementing supply chain risk management policies within their organizations. The office caters for C-SCRM which will address issues ranging from counterfeit components to open-source software vulnerabilities.

The sources for this piece include an article in TheRegister.

SUBSCRIBE NOW

Related articles

Cyber Security Today, Week in Review for week ending Friday May 17, 2024

Welcome to Cyber Security Today. This is the Week in Review for the week ending Friday, May 17th,...

Cyber Security Today, May 17, 2024 – Malware hiding in Apache Tomcat servers

Malware hiding in Apache Tomcat servers, new backdoors found, and more Welcome to Cyber Security Today. It's Friday, May...

MIT students exploit blockchain vulnerability to steal 25 million dollars

Two MIT students have been implicated in a highly sophisticated cryptocurrency heist, where they reportedly exploited a vulnerability...

Cyber Security Today, May 15, 2024 – Ebury botnet still exploits Linux servers, Microsoft, SAP and Apple issue security updates

The Ebury botnet continues to exploit Linux servers, Microsoft, SAP and Apple issue security updates, and more. Welcome to...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways